Operations | Monitoring | ITSM | DevOps | Cloud

Why your log management software may not give you the real Dashboard experience

Visualizing log data is one of the biggest perks of using good log management software. Data is many businesses’ most critical asset. But, without proper use, a business’ data becomes just an artifact and no longer an asset. Visualization and analysis are the end goals of collating log data from their sources. The need for visualization arises from the fact that we intuitively process visual information faster than a random jumble of numbers and letters.

When Big Data Goes Wrong: 3 Common Issues and Possible Solutions

Our shared future has always been profoundly enigmatic. Hoary seers from days of yore would never have predicted everyday life as it is now. It would have been impossible to guess most of what has already happened in the 21st century. Peering into crystal balls would have proved equally futile. Even an attempt to make well-educated guesses about possible issues with big data would likely have been way off the mark.

Master Data Management and Data Governance-How to Build an Effective Strategy

As organizations marshal their data to drive business value throughout the enterprise, it’s becoming more important than ever to ensure the quality of this data. Building data quality, data validation testing, and aligning the data with your organization’s master data (such as products, customers, assets, and locations) is critically important to ensure your reporting is consistent and accurate.

Web Performance of the World's Top 50 Blogs

Am I the only one who thinks blogs were in their prime in the mid-2010s, before the internet began consuming content at wicked fast rates (thanks, Instagram and TikTok)? When someone says the word blog, I think of the chokehold 2015 southern American female fashion bloggers had on the internet. Pure pumpkin spice latte fashion. And though those blogs have, probably for the best, slipped away from the limelight, blogs are still alive and well.

CVE-2020-27304 - RCE via Directory Traversal in CivetWeb HTTP server

JFrog has recently disclosed a directory traversal issue in CivetWeb, a very popular embeddable web server/library that can either be used as a standalone web server or included as a library to add web server functionality to an existing application. The issue has been assigned to CVE-2020-27304.

A Candid Conversation about a Career in Cybersecurity: Q&A with Daniel Spicer

This week is Cybersecurity Career Awareness Week, which is part of October’s Cybersecurity Awareness Month. We sat down with Daniel Spicer, chief security officer at Ivanti, to learn more about what it’s like to work in the cybersecurity world.

Uptime/SLA calculator: what is an SLA and how to calculate it?

A Service Level Agreement (SLA) is a document that details the expected level of service guaranteed by a vendor or product. This document generally sets out metrics such as uptime expectations and any payoffs if these levels are not met. For example, if a provider advertises an uptime of 99.9% and exceeds 43 minutes and 50 seconds of service downtime, technically the SLA has been breached and the customer may be entitled to some type of remuneration depending on the agreement.

Vendor Switching With OpenTelemetry (OTel)

You might already know that OpenTelemetry is the future of instrumentation. It’s an open-source and vendor-neutral instrumentation framework that frees you from the trap of using proprietary libraries simply to understand how your code is behaving. Best of all, you can instrument your applications just once and then take that instrumentation to any other backend system of your choice. This blog shows you exactly how to use OpenTelemetry to ✨break the vendor lock-in cycle.✨